Data Protection — News
Since the outbreak of civil unrest in the Middle East, we have seen an increased focus on the role played by social networking and mobility. When these two technologies are combined, the ability of a ‘flash mob’ to rally behind a single idea, or to a single location, has greatly increased.
Technology is a wonderful thing but while the majority of people will use it for proper and honest purposes, there will always be a small percentage who will use it for unethical reasons. And this is an important point to make – people use the technology for illegal or immoral purposes; the technology itself is not the issue.
The tally of digital certificates stolen from a Dutch company in July has exploded to more than 500, including ones for intelligence services like the CIA, the U.K.'s MI6 and Israel's Mossad, a Mozilla developer said Sunday.
The impact of the breach of Dutch Secure Sockets Layer (SSL) certificate authority (CA) DigiNotar has widened as Dutch authorities confirm its own certificate program was compromised in the attack, likely meaning a massive clean up job for its websites.
HBGary Federal was just one of many low-profile security contractors peddling its wares to clients with secrets to protect -- until earlier this year when the U.S. firm drew the attention of hackers.
Cybercriminals are always looking for easy ways to break into your network, whether at work or at home. In a talk at this summer's DefCon 19 conference, security researcher Deral Heiland demonstrated various ways to compromise Internet-ready consumer-grade multifunction printers. These include printers that can scan to a file, scan to email, and fax documents, and the vulnerabilities he found are similar across all vendors.
It is hard not to be the center of controversy when you're a site like WikiLeaks that specializes in exposing information that was never intended for the general public. The whistleblowing, freedom of the press advocate is in hot water again as it is the victim itself of a breach that exposed US State Department communications that had been leaked to it.
A faction of the infamous hacktivist collective Anonymous appears to be branching off from the group's social responsibility mission and getting into the celebrity snooping business.
A mish-mash of security issues came up this week, everything from how to protect virtualized environments to a system that protects copper in utility sites from robbery and a story about digital certificate thefts.
"$10,000, Expert, Please, Help, are some of the common words that compose emails used to lure innocent victims by cyber criminals" says Longe Oluminde Babatope, a cyber-security expert from Nigeria. Longe adds that most of these emails are rich in vocabularies, when such words form 5% of an email, with special characters and different reply links, then these emails should immediately be marked as spam.
A Melbourne-based app developer has spoken about the security pitfalls of smartphone apps, saying that while certain mobile environments are more susceptible to malware, such risks can be eliminated through encryption and using common sense.
The U.K. is continuing to aggressively pursue so-called hacktivists, charging two men and arresting two more on Thursday who are allegedly connected with the groups Anonymous and Lulz Security.
At CSO we are fascinated by the influence of pop-culture on cybercrime and security so we have put together a selection of the most influential security novels.
It was shocking to learn yesterday that Kernel.org was hacked last month. News like that is routine in the world at large, but not in the home of the all-important heart of Linux.
Hacking has gone the way of FourSquare and gaming in general by adding scores and leaderboards for who can make the most daring hacks. We're not making this up.
The major security vendors have a strong presence at VMworld 2011, VMware Inc.'s [NYSE: VMW] annual user conference. And it's not surprising, given that security remains a top-of-mind concern for many enterprises considering embracing cloud computing.
Pakistan's notoriously censorious telecoms authority has reportedly asked the country's ISPs to block commercial VPN connections as a way of stopping militants from communicating in secret.
The rise in cyber attacks continue to increase in frequency and sophistication. Attacking the source of the cyber attacks is illegal, but in instances where the source is known and there is no collateral damage it may be occurring under the guise of active-defence.
As AVG Ambassador Tony Anscombe explained the rational behind some of the new features in AVG Internet Security 2012, released today, I couldn't help but think of the bouncer at one of my favourite local pubs.
Besides the fraudulent security certificates Dutch authority DigiNotar issued for Google.com, more were made for Yahoo.com, Mozilla.org, torproject.org, wordpress.org and an Iranian blogging platform, Baladin, according to a Dutch report.
Sign up now »
Deep Discovery is uniquely designed for threat detection, real-time intelligence, adaptive protection, and rapid response to combat targeted attacks and Advanced Persistent Threats (APTs).
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.